Have I Been Pwned - Check if Your Email Address is in a Data Breach - Tubblog: The Hub for MSPs

Have I Been Pwned – Check if Your Email Address is in a Data Breach

Have I Been Pwned – Check if Your Email Address is in a Data Breach image

How many organisations have you shared your email address with over the years? Hundreds? Thousands? Have you ever wondered whether any of those organisations have been involved in a data breach?

Every Friday I share one of my favourite finds of the week — a website, tool or an app that has impressed me.

My Friday Favourite this week is Have I Been Pwned – Check if Your Email Address is in a Data Breach.

What is it?

Have I Been Pwned is a service that allows anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or “pwned” in a data breach.

How much does it cost?

The Have I Been Pwned service is free to use.

Check if Your Email Address is in a Data Breach

I’ve written extensively about Cyber Security for Small Businesses, and the importance of keeping clients data secure.

However, data breaches can and do happen. But how do you know if your data has been breached?

Have I Been Pwned is a web-site created by Microsoft Regional Director and web security evangelist Troy Hunt.

Hunt put together the site after what was, at the time, the largest ever single breach of customer accounts — the Adobe hack.

After the Adobe hack, Hunt said he did a post-breach analysis of user credentials and kept finding the same accounts exposed over and over again, often with the same passwords. This then put the victims at further risk of their other accounts being compromised.

(There’s a big lesson there about using a strong password and making sure you use different passwords for different web-sites).

Have I Been Pwned - Check if your email address is in a data breachData breaches are rampant, and it’s hard to keep track with whether your data has been breached.

That’s where Have I Been Pwned can help.

Simply visit the web-site, and enter your email address.

Immediately, you will be told whether your email address was involved in a data breach and which breach(es) it was involved in.

If you have not already changed your password for the sites that you find have been breached, then now is the time to do so!

You can also freely subscribe to get notified when future pwnage occurs and your account is compromised.

Have I Been Pwned will send you an email as and when it discovers new breaches that your email address has been involved in.

I talked to Kevin Lancaster of ID Agent about The Dark Web and Keeping Managed Service Provider (MSP) Clients Safe, and it’s truly terrifying to understand the market there is amongst cyber criminals for our personal data.

I’d recommend using Have I Been Pwned to stay aware of how data breaches can affect you.

You can use the Have I Been Pwned service from @TroyHunt to check if your email address has been involved in a data breach. Click to Tweet

 

How can I get it?

To find out more visit the Have I Been Pwned web-site.

You can also follow @TroyHunt (the creator of Have I Been Pwned) on Twitter, visit Troy Hunt’s Facebook page or follow Troy Hunt on LinkedIn.

You Might Also Be Interested In

RICHARD TUBB

Richard Tubb is one of the best-known experts within the global IT Managed Service Provider (MSP) community. He launched and sold his own MSP business before creating a leading MSP media and consultancy practice. Richard helps IT business owner’s take back control by freeing up their time and building a business that can run without them. He’s the author of the book “The IT Business Owner’s Survival Guide” and writer of the award-winning blog www.tubblog.co.uk

All Posts

You might like:

Fight Back Against the Hackers with Huntress Security Solutions image

Fight Back Against the Hackers with Huntress Security Solutions

Article | By Stephen McCormick
Complement Your Cybersecurity Strategy with Security Awareness Training image

Complement Your Cybersecurity Strategy with Security Awareness Training

Article | By Stephen McCormick
How A Penetration Test Uncovered Astonishing Network Flaws image

How A Penetration Test Uncovered Astonishing Network Flaws

Artificial Intelligence | By Richard Tubb
Defence in Depth: Better Results From a Layered Security Strategy image

Defence in Depth: Better Results From a Layered Security Strategy

Article | By Stephen McCormick
Phishing Defence Coaching: A Targeted Approach To End-User Security Training image

Phishing Defence Coaching: A Targeted Approach To End-User Security Training

Article | By Stephen McCormick
Understanding Deepfake Technology: Why It’s A Risk To Your Business image

Understanding Deepfake Technology: Why It’s A Risk To Your Business

Article | By Stephen McCormick
Cybersecurity Masterclasses: Practical Advice To Boost Security For MSPs image

Cybersecurity Masterclasses: Practical Advice To Boost Security For MSPs

Article | By Stephen McCormick
In-House or Outsourced Cybersecurity: What’s Best for MSPs? image

In-House or Outsourced Cybersecurity: What’s Best for MSPs?

Article | By Graham Pierrepoint
Don’t Count Sheep: 3 Tech Gadgets to Help You Sleep image

Don’t Count Sheep: 3 Tech Gadgets to Help You Sleep

Personal Development | By Richard Tubb
Brigantia Roadshow: Tools For MSPs To Mitigate Insider Threats image

Brigantia Roadshow: Tools For MSPs To Mitigate Insider Threats

Article | By Stephen McCormick
Key Importance of Privacy for MSPs and Clients image

Key Importance of Privacy for MSPs and Clients

Article | By Guest Author
Championing the Cybersecurity Right of Boom and the MSP Revolution image

Championing the Cybersecurity Right of Boom and the MSP Revolution

Article | By Graham Pierrepoint

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

Explore.

Share via
Send this to a friend